17.06.2015 Views

browser exploit packs – exploitation tactics - SecNiche Security Labs

browser exploit packs – exploitation tactics - SecNiche Security Labs

browser exploit packs – exploitation tactics - SecNiche Security Labs

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BROWSER EXPLOIT PACKS – EXPLOITATION TACTICS SOOD & ENBODY<br />

[12] ZeroDay Initiative (ZDI). Sun Java Runtime<br />

Environment MixerSequencer Invalid Array Index<br />

Remote Code Execution Vulnerability.<br />

http://www.zerodayinitiative.com/advisories/ZDI-10-<br />

060/.<br />

[13] Malware at Stake. Java OBE + BlackHole – Dead<br />

Man Rising. http://secniche.blogspot.com/2011/02/<br />

java-obe-tookit-<strong>exploit</strong>s-blackhole-dead.html.<br />

[14] Felegyhazi, M.; Kreibich, C. On the Potential of<br />

Proactive Domain Blacklisting. Usenix LEET<br />

Workshop 2010.<br />

[15] MaxMind. http://www.maxmind.com/app/php.<br />

[16] RFC 2616. http://www.w3.org/Protocols/rfc2616/<br />

rfc2616.html.<br />

[17] Park, B.; Hong, S.; Oh, J.; Lee, H. Defending against<br />

Spying with Browser Helper Objects.<br />

http://ccs.korea.ac.kr/papers/tech05_01.pdf.<br />

(Technical Report) 2005.<br />

[18] Polychronakis, M.; Anagnostakis, K.G.; Markatos,<br />

E.P. An Empirical Study of Real-world Polymorphic<br />

Code Injection Attacks. Usenix LEET Workshop<br />

2009.<br />

VIRUS BULLETIN CONFERENCE OCTOBER 2011<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!